Unit 6 - Network Security
Unit 6 - Network Security
Unit 6 - Network Security
Define Network:
Define Security:
Network Security:
2. Message Integrity
• It means the data must reach the destination without any
adulteration i.e. exactly as it was sent.
• There must be no changes during transmission, neither
accidentally nor maliciously.
3. Message Authentication:
• In message authentication the receiver needs to be sure
of the sender’s identity i.e. the receiver has to make sure that
the actual sender is the same as claimed to be.
4. Message non-reproduction
• Non-repudiation means that a sender must not be able to deny
sending a message that it actually sent.
• The burden of proof falls on the receiver.
• Non-reproduction is not only in respect of the ownership of
the message; the receiver must prove that the contents of the
message are also the same as the sender sent.
• Non-repudiation is achieved by authentication and integrity
mechanisms.
5. Entity Authentication
• In entity authentication (or user identification) the entity or
user is verified prior to access to the system resources.
Cryptography
Example
Plaintext: recent trends in IT
Cipher text: Jhhnvirujhhnv
Basic Model of Cryptography
1. Plaintext:
The original message to be encrypted, known as the
plaintext.
2. Cipher text:
The output of the encryption process known as the
cipher text.
3. Encryption Algorithm:
It is the set of rules that convert plaintext into cipher
text by using encryption algorithm.
4. Decryption Algorithm:
2. Transposition Ciphers:
Example:
A B C D E………. Z
0 1 2 3 4…………25
Plaintext H E L L O
Number 7 4 11 11 14
Key (give b a x y c
any 1 0 23 24 2
alphabet)
Add 8 4 34 35 16
(7+1) (4+0) (11+23) (11+24) (14+2)
Subtract 8 4 8 9 16
(26-34) (35-26)
Cipher text I E I J G
Cryptographic Attacks:
1.Passive Attack:
2.Active Attack:
In active attack there is modification in packet or
information.